cyber security Crossword Puzzles
Cybersecurity and Compliance Week! 2025-11-10
Across
- What emails are you supposed to report to IT?
- What is a security measure that requires at least two forms of identification?
- Who is a person who gains unauthorized access to computer systems?
- What is the process of converting data into a secure format?
- Who is the HR Reporting Officer?
- What are you supposed to do to your computer to not receive a blue HIPAA Hippo?
- What is the term for the agreement between covered entities and business associates?
- You are the first line of ___ in protection of DDID and AHS
Down
- What type of malicious software is designed to block access to a computer system until a sum of money is paid?
- What is a central concept of HIPAA that protects individuals' health information?
- Who is the HIPAA Privacy Officer?
- What is the term for malicious software?
- Who is the Security Officer?
- What are all DDID and AHS employees supposed to wear so it can be seen to adhere to security best practices?
14 Clues: Who is the Security Officer? • Who is the HR Reporting Officer? • Who is the HIPAA Privacy Officer? • What is the term for malicious software? • What emails are you supposed to report to IT? • You are the first line of ___ in protection of DDID and AHS • What is the process of converting data into a secure format? • ...
The Korean War 2022-06-22
Across
- Capital of North Korea
- Action of not turning up to something in protest (Soviet Union at the Security Council)
- Name of vote needed to agree on military intervention by the UN Security Council
- Country banned from taking up its seat at the UN Security Council following its Communist takeover.
- Pocket that South Korean troops were pushed into by the North Korean invasion
- The name of the UN commander who was sacked by US President Harry Truman
- Leader of South Korea
Down
- Political system that operated in South Korea
- Political system that operated in North Korea
- Port city attacked by the UN Taskforce in September 1950
- The 38th ___________ separated North and South Korea
11 Clues: Leader of South Korea • Capital of North Korea • Political system that operated in South Korea • Political system that operated in North Korea • The 38th ___________ separated North and South Korea • Port city attacked by the UN Taskforce in September 1950 • The name of the UN commander who was sacked by US President Harry Truman • ...
Cybersecurity Week 2022-10-14
Across
- a service that creates a secure tunnel between your device and the internet
- a malicious software that spreads from one computer to another
- the process of verifying a users identity
- malicious code or software
Down
- taking readable plaintext, and converting it into ciphertext
- when attackers send malicious emails to trick people into a scam
- a software update that fixes bugs or updates security
- a security technique that requires multiple methods of authentication
- a malware that encrypts user data, and requires payment to get back
- a secret word or phrase that must be used to gain access to something
- a network security device that monitors traffic to or from your network
11 Clues: malicious code or software • the process of verifying a users identity • a software update that fixes bugs or updates security • taking readable plaintext, and converting it into ciphertext • a malicious software that spreads from one computer to another • when attackers send malicious emails to trick people into a scam • ...
Moderne Technologien 2016-11-22
6 Clues: Sucht • Prozess des einsam Werdens • Fähigkeit im Gehirn zu speichern • verkörpert die künstliche Intelligenz • absichtliche Bedrohen oder Belästigen auf Internet z.B. • Fokussierung der Aufmerksamkeit auf bestimmte Tätigkeit
CompTIA Cloud+ Ch. 9 2025-01-06
Across
- Tool for filtering network traffic.
- Reviewing logs to identify security issues.
- Adherence to legal and regulatory standards.
- Measures to protect data and systems.
- Securely connects users to a private network.
Down
- Digital document proving identity.
- Replacing sensitive data with non-sensitive equivalents.
- Authentication requiring more than one verification method.
- Encoding data to prevent unauthorized access.
- Ensuring data accuracy and consistency.
- Identity and Access Management.
- Updating software to fix vulnerabilities.
12 Clues: Identity and Access Management. • Digital document proving identity. • Tool for filtering network traffic. • Measures to protect data and systems. • Ensuring data accuracy and consistency. • Updating software to fix vulnerabilities. • Reviewing logs to identify security issues. • Adherence to legal and regulatory standards. • Encoding data to prevent unauthorized access. • ...
Goodbye to Childhood 2021-10-20
Across
- change (para.1)
- disagreement (para.4)
- capable of thinking or acting for oneself (para.1)
- related to the body (para.2)
Down
- uncomfortably think of oneself as an object of the observation of others (para.3)
- feeling of security (para.4)
- very (para.4)
- resolution (para.4)
- related to the mind (para.3)
- small round marks on the skin (para.3)
- worrying (para.1)
- sudden increase (para.2)
12 Clues: very (para.4) • change (para.1) • worrying (para.1) • resolution (para.4) • disagreement (para.4) • sudden increase (para.2) • feeling of security (para.4) • related to the mind (para.3) • related to the body (para.2) • small round marks on the skin (para.3) • capable of thinking or acting for oneself (para.1) • ...
airport vocab 2025-04-15
16 Clues: ticket • luggage • jet lag • allowed • airport • toilets • boarding • on board • canceled • car rental • destination • flight number • metal detector • passport control • emergency landing • security screening
ACCESS CONTROL 2025-05-29
Across
- Subway .......... are the example of physical access control.
- Unlocking a smartphone with a ..........scan is an example of information access control.
- The guest’s keycard ........them access to their room, the guest elevator, and the pool
- Information access control ........... access to data and the software used to manipulate that data.
- Physical access control is a set of ............ to control who is granted access to a physical location.
- a hotel .......... scanner only grants access to authorized guests who have a hotel key.
Down
- The security practice of confirming that someone is who they claim to be.
- financial holdings
- the process of determining which level of access each user is granted.
- ............ access control establishes strict security policies for individual users and the resources, systems, or data they are allowed to access.
- worker
- Security ..........is an official determination that an individual may access information
- extra
13 Clues: extra • worker • financial holdings • Subway .......... are the example of physical access control. • the process of determining which level of access each user is granted. • The security practice of confirming that someone is who they claim to be. • The guest’s keycard ........them access to their room, the guest elevator, and the pool • ...
Chapter 2 Crossword 2025-09-29
17 Clues: race • actors • powers • powers • system • Treaty. • sharing • dilemma • system. • dilemma • cohesion • Morality • analysis • interest • of power • of Ideas. • transition theory
Realism 2023-10-04
Across
- Thinker that established the different types of balance of power: unpolar, bipolar, multipolar.
- No hierarchically superior, coercive authority.
- Thinker that placed that the international system is anarchic.
- Also called structural realism,focuses its studies in the analysis of the structure of the international system.
- Thinker that established the dynamism in realism-history = cycles of dominant powers.
- Sum zero game, where a gain in security for one state means a loss for another.
- balancing Gaining power by building up its own military resources.
- Type of realists that say that war is an inevitable result to balancing
- A process explained by offensive realists as joining an unlikely ally to avoid war with it.
- According to realists, this is the states' main focus.
Down
- For this thinker, the state is the principal actor, it is unitary, rational and focused on protecting themselves.
- balancing Gaining power by allying with other states.
- Focuses mostly on the state and the international system.
- How much more one state gains over another.
14 Clues: How much more one state gains over another. • No hierarchically superior, coercive authority. • balancing Gaining power by allying with other states. • According to realists, this is the states' main focus. • Focuses mostly on the state and the international system. • Thinker that placed that the international system is anarchic. • ...
Accounting: Payroll/Tax 2025-06-14
Across
- Taxes paid (medicare or social security)
- For journalizing earnings in payroll
- rates When employers contribute equal amount to the retirement plan as employee
- Journalizing income tax
- A common retirement plan that deducts a select amount regularly
- Paid every 3 months
Down
- Journalizing social security
- Paid every month
- Your actual salary after deductions
- Paid every two weeks
- Paid every week
11 Clues: Paid every week • Paid every month • Paid every 3 months • Paid every two weeks • Journalizing income tax • Journalizing social security • Your actual salary after deductions • For journalizing earnings in payroll • Taxes paid (medicare or social security) • A common retirement plan that deducts a select amount regularly • ...
Jenifer Ximena Hernandez Morales 2013-05-01
Across
- security.
- to the average employee.
- and network security help to keep data and equipment
- their data and computer
Down
- computer can be harmed
- are secure.
- technician to try to gain entry into a facility
- might repair, adjust, and install equipment.
- by attackers
- primary responsibilities of a technician include data and
10 Clues: security. • are secure. • by attackers • computer can be harmed • their data and computer • to the average employee. • might repair, adjust, and install equipment. • technician to try to gain entry into a facility • and network security help to keep data and equipment • primary responsibilities of a technician include data and
TTS Firewall Rizky A Dahlan 2022-11-09
Across
- Mensyaratkan bahwa informasi tersedia untuk pihak yang memiliki wewenang ketika dibutuhkan adalah definisi dari …
- firewall yang hanya bisa melindungi satu komputer adalah firewall berbasis...
- Perubahan terhadap tampilan suatu website secara illegal disebut..
- fungsi dari firewall untuk ... Data dari Hacker dan Pengguna Tak Bertanggung Jawab
- kelebihan firewall berbasis jaringan adalah menjaga jaringan secara...
- berapakah element pada host hardening …
Down
- firewall terbagi menjadi ... jenis
- Yang termasuk jenis metode enkripsi adalah …
- Terdiri dari database security, data security, dan device security adalah keamanan di level …
- ....adalah sistem yang dirancang untuk mencegah akses yang tidak sah yang ingin memasuki jaringan pribadi
- arti dari kata firewall
- Firewall untuk melakukan multiplexing terhadap lalu lintas dari jaringan internal untuk kemudian menyampaikannya kepada jaringan yang lebih luas (MAN, WAN atau Internet) seolah-olah paket tersebut datang dari sebuah alamat IP atau beberapa alamat IP disebut …
- firewall bekerja dengan cara ... seluruh data yang masuk
13 Clues: arti dari kata firewall • firewall terbagi menjadi ... jenis • berapakah element pada host hardening … • Yang termasuk jenis metode enkripsi adalah … • firewall bekerja dengan cara ... seluruh data yang masuk • Perubahan terhadap tampilan suatu website secara illegal disebut.. • kelebihan firewall berbasis jaringan adalah menjaga jaringan secara... • ...
Cybersecurity Awareness Month 2023 2023-08-29
Across
- This security tool identified and removes malicious programs
- The individuals who control access to people, data, and systems
- This attack occurs when cybercriminals research and track which sites employees visit the most
- What should you do when a workstation or device is no longer in use
- Any scenario that triggers emotions should also trigger your __________
Down
- Stealing money is the main goal behind this type of malware
- Failure to run these equals failure to patch security vulnerabilities
- You can help fight cybercrime by becoming a ________________
- ____are the last line of defense
- Kwiktrip's password policy requires that coworkers change their passwords _____days
- The future of security is____,not machines
- This attack occurs when someone sneaks into a secured area behind someone else
- This dangerous attack targets specific people or organization, often with custom made email or messages
- These are designed to maintain the security of everyone associated with an organization
14 Clues: ____are the last line of defense • The future of security is____,not machines • Stealing money is the main goal behind this type of malware • You can help fight cybercrime by becoming a ________________ • This security tool identified and removes malicious programs • The individuals who control access to people, data, and systems • ...
InfoSec Puzzle Quest 2025-09-04
Across
- A type of malicious software that can replicate and spread.
- Security Protecting data and systems hosted on remote servers.
- Following rules, regulations, and standards in cybersecurity.
- A formal review of systems and processes to ensure security and compliance.
- Manipulating people into giving up confidential information.
Down
- The practice of protecting systems, networks, and data from digital threats.
- Ensuring data is accurate and has not been tampered with.
- Surfing A sneaky way to steal information by watching someone type their password.
- An unexpected event that compromises the integrity or availability of data.
- Software designed to detect and remove malicious programs.
10 Clues: Ensuring data is accurate and has not been tampered with. • Software designed to detect and remove malicious programs. • A type of malicious software that can replicate and spread. • Manipulating people into giving up confidential information. • Following rules, regulations, and standards in cybersecurity. • ...
Un Viaje Memorable 2023-04-19
18 Clues: seat • plane • aisle • window • ticket • airport • passport • terminal • seat belt • passenger • boarding pass • screen / sign • metal detector • first class seat • flight attendant • suitcase / luggage • economy class seat • security control / check
słówka 2025-06-24
15 Clues: spokój • zranić • ukraść • według • pewien • strach • ochrona • wchodzić • kaloryfer • zagrożenie • kupić (nabyć) • odwracać uwagę • at...... w końcu • spokojny/pokojowe • at...... przynajmniej
Qatar Cross Word 2021-11-24
6 Clues: Full Form of QNA • Slogan Raised In Qatar • Thing related to Cyber bullying • Historic Visit To Break Blockade • Thing that happened with Saudi Arabia • capital of independent Palestinian state
ICT - Security and Communication 2017-11-20
Across
- A type of protocol that allows data to be sent and received securely over the internet.
- Software that gathers data by monitoring key press on the user/s keyboard.
- Malicious code installed a user's computer where the users are redirected to a fake website without their knowledge.
- Refers to the need to respect other user's views and display common courtesy when posting views online.
- Web applications or website that allow users to create and edit web pages using any web browser.
- A combination of letters, symbols and numbers that protects a system and allows a user to login.
- The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, etc.
- Authentication that relies on certain unique characteristics of human beings.
- Uses SMS system of mobile phones to send out fake text messages.
- Computer network based on internet technology but designed to meet the internal needs for sharing info within a single organisation.
- Refers to safety when using the internet like keeping personal data safe.
- A cloud where the storage environment where the customer/client and cloud storage provider are different companies
- Sits between the user's computer and an external network and filters information coming in and out of the user's computer.
Down
- This form of phishing uses a voice mail message to trick users into calling the number contained in the message.
- Unsolicited email sent over the internet.
- A cloud where the storage is provided by a dedicated environment behind a company firewall.
- Used to verify that data comes from a secure and trusted source.
- Similar to blogs but are most often used on social networking sites to make shrt, frequent posts.
- Used to protect data in case it has been hacked or accessed illegally. It makes the data meaningless unless the recipient has the necessary key.
- Creator sends out legitimate-looking emails to target users and fooled into giving their personal data.
- Program that can replicate itself with the intention of deleting or corrupting files in a computer system.
- Personal internet journals where the writer will type in their observations and opinions on certain topics.
- World wide collection of networks that allow users to chat, send and receive emails, do video calls, etc.
- The act of gaining unauthorized access to a computer system.
- Damage to fingers and wrists caused by continuous use of keyboard or repetitive clicking of mouse buttons.
25 Clues: Unsolicited email sent over the internet. • The act of gaining unauthorized access to a computer system. • Used to verify that data comes from a secure and trusted source. • Uses SMS system of mobile phones to send out fake text messages. • Refers to safety when using the internet like keeping personal data safe. • ...
Fnaf Security Breach Crossword 2022-02-12
Across
- Stuns only one animatronic at a time
- All animatronics need this to keep moving around
- Mexican bear
- The arcade game where you see a glitched version of the daycare attendant
- This is what the animatronics are
- You broke the rules
- An attraction that is constantly under maintenance
- The gator's full name
- No longer allowed inside
- A warning given to the main character by the daycare attendant
- The player uses this to scramble the yellow console that gives out passes
- Needed to get into the daycare
- A cool place for a cool sport
- An attraction with no animatronic
- The daycare attendant says this twice when he throws you out of the daycare or if you try to enter again
- An attraction that has a statue of three animatronics inside
- The main villain that makes an appearance in an area below the pizzaplex
- Freddy's way of saying 'good job'
- Loves to entertain children at the Daycare
- Survive until then
- Moon says this before he starts chasing you
Down
- Every horror game needs this
- The part you take from the gator to upgrade Freddy
- This animatronic's catchphrase is 'Rock and Roll'
- Makes an appearance in cardboard cutouts, but never as an animatronic in the game
- The animatronics patrolling the halls
- The child you play as in Security Breach
- The name of the building
- Eats garbage
- Stuns a large group of animatronics at a time
- The tallest animatronic in the game
- The bear misses him
- A bunny that is after the player in the game
- You find these throughout the game
- Defend the galaxy
- In charge of nap time in the Daycare
- The part you take from the chicken to upgrade Freddy
- Where the main four perform
- Where the player can upgrade Freddy
- The nightguard
- Don't get lost
- The father figure of the entire game
- The instrument the gator plays
- The name of the game
- Bright and vibrant colors
- Take a map
- Has a very big ego, but is self conscious
- The small animatronic that chases you through the vents
- The part you take from the wolf to upgrade Freddy
- The instrument the wolf plays
- Use this to see security cams, talk to Freddy, view missions, or see confidential messages towards Fazbear Entertainment
- The instrument the chicken plays
52 Clues: Take a map • Mexican bear • Eats garbage • The nightguard • Don't get lost • Defend the galaxy • Survive until then • You broke the rules • The bear misses him • The name of the game • The gator's full name • The name of the building • No longer allowed inside • Bright and vibrant colors • Where the main four perform • Every horror game needs this • A cool place for a cool sport • ...
Security Analysis & Portfolio Management 2022-05-15
Across
- The ability to buy or sell an asset quickly at a known price.
- The --------------------frontier represents the set of portfolios with the maximum rate of return for every given level of risk, or the minimum risk for every level of return.
- The ---------------------- component represents the portion of the portfolio’s actual return beyond that available to an unmanaged portfolio with identical systematic risk and is used to assess the manager’s investment prowess.
- --------------------ratio measures the average return in excess of that of a benchmark portfolio divided by the standard deviation of this excess return.
- The market ------------------is used as a benchmark to evaluate the performance of funds.
- ------------------------was one of the originators of Capital Asset Pricing model.
- The stop------------------order is a conditional market order to buy the stock if it increases to a specified price.
- ------------------------laid the foundations to the Portfolio theory.
- The ----------------------theorem suggests that investment and financing are two different decisions.
Down
- The APT differs from the CAPM because the APT recognizes multiple ---------------------risk factors.
- Performance ------------------analysis attempts to distinguish the source of the portfolio’s overall performance.
- A -------------form EMH is when prices reflect all historical information.
- ------------------of returns is the measure of the degree to which rates of return move together relative to the individual mean values over time.
- A ---------------sale is a transaction in which the seller sells overpriced stock which he/she does not own but borrows from another investor through a broker.
- The --------------market is used for lending and borrowing short-term funds.
- The --------------measure is calculated as excess returns per unit of systematic risk.
- The --------------------market line is the graphical representation of CAPM.
- -------------------measure calculates the portfolio’s average return in excess of a user-selected minimum acceptable return threshold per unit of downside risk.
- --------------------measure represents the average excess return of the portfolio above that predicted by an asset pricing model.
- The market ------------------in its’ pure form means shifting funds between a market index portfolio and safe assets such as T-bills or money market funds depending on whether the market as a whole is expected to outperform the safe asset.
20 Clues: The ability to buy or sell an asset quickly at a known price. • ------------------------laid the foundations to the Portfolio theory. • A -------------form EMH is when prices reflect all historical information. • The --------------market is used for lending and borrowing short-term funds. • ...
Cryptography And Network Security 2023-09-18
Across
- In base 26, multiplication of YES by NO gives –
- _______ is the science and art of transforming messages to make them secure and immune to attacks
- The ciphers of today are called round ciphers because they involve---------round
- ----------round constants (RCs) are required in Whirlpool?
- ---------is not a type of symmetric-key cryptography technique?
- Divide (HAPPY)26 by (SAD)26. We get quotient –
- The ________ is the message after transformation
- ---------round provides linear diffusion in the Whirlpool Algorithm?
- In symmetric-key cryptography, the key locks and unlocks the box is
- The man-in-the-middle attack can endanger the security of the Diffie-Hellman method if two parties are not
Down
- . A/an ________ algorithm transforms ciphertext to plaintext
- In asymmetric key cryptography, the private key is kept by ________
- The shift cipher is sometimes reffered to as a ---------
- What is the number of round computation steps in the SHA-256 algorithm?
- can be considered as the class of computer threats
- The ________ is the original message before transformation
- Another name for the Whirlpool key is
- is considered as the unsolicited commercial email?
- An asymmetric-key (or public-key) cipher uses
- Symmetric-key cryptography started thousands of years ago when people needed to exchange
20 Clues: Another name for the Whirlpool key is • An asymmetric-key (or public-key) cipher uses • Divide (HAPPY)26 by (SAD)26. We get quotient – • In base 26, multiplication of YES by NO gives – • The ________ is the message after transformation • can be considered as the class of computer threats • is considered as the unsolicited commercial email? • ...
Chapter 7 Security Plus 2024-10-03
Across
- An access control scheme that is the least restrictive
- injects stolen username and password across multiple websites
- Granting or denying approval to use specific resources
- The ability of systems to exchange information
- small device that looks like a thumb drive which can be used for verification
- enables users to access a network resource through a directory service
- small number of passwords used when trying several different user accounts
- Adding a random string to a hash algorithm for enhanced security
- A key pair “burned” into a security key
- features and characteristics of the individual
- Removing user accounts
- An access control scheme that is the most restrictive
- password attack attempting thousands of combinations per second
Down
- Single sign-on for networks owned by different organizations
- software designed to break passwords
- Using more than one type of authentication credential
- Requiring the user to provide proof that they are the unique user.
- Granting access that is limited
- key stretching algorithms
- Standard preconfigured passwords
- evidence or proof of something
- allows secure web domains to exchange user authentication and authorization data
- The point in time when a password is no longer valid
- An open-source federation framework
- provide control over user validation and the resources that may be accessed
25 Clues: Removing user accounts • key stretching algorithms • evidence or proof of something • Granting access that is limited • Standard preconfigured passwords • An open-source federation framework • software designed to break passwords • A key pair “burned” into a security key • The ability of systems to exchange information • features and characteristics of the individual • ...
Chapter 4 Security Plus 2024-09-10
Across
- multiple CAs that sign digital certificates
- management of keys and digital certificates at scale
- An certificate that uses an asterisk to cover multiple subdomains
- The entity that is responsible for digital certificates
- one master CA called the root
- associate a user’s identity to a public key
- confidence in or reliance on another person/entity
- published set of rules that govern operation of a PKI
- A process in which keys are managed by a third party
- A protocol suite for securing Internet Protocol (IP) communications
- securely distributing encryption keys between two parties
- Tracing a certificate back to the highest level of a CA
- An entity that is trusted by others
- The common file types for storing X.509 certificates
- A list of certificate serial numbers that have been revoked
- an extension to X.509 that allows various values to be associated with a security certificate
- Data that is encapsulated within a secure outer shell
Down
- replaces SSL
- Encrypts only the payload preserves the original IP header
- digitally sign a program
- M of N
- A method of controlling public keys
- publicly accessible centralized directory of digital certificates
- performs a real-time lookup of a certificate’s status
- A request submitted to a Certificate Authority for an TLS/SSL certificate
- Encrypts the entire IP packet and encapsulates it within a new IP packet
- web servers send queries to the OCSP Responder
27 Clues: M of N • replaces SSL • digitally sign a program • one master CA called the root • A method of controlling public keys • An entity that is trusted by others • multiple CAs that sign digital certificates • associate a user’s identity to a public key • web servers send queries to the OCSP Responder • confidence in or reliance on another person/entity • ...
Chapter 10 Security Plus 2024-10-23
Across
- A framework for transporting authentication protocols
- uses digital certificates for authentication
- Unauthorized users could listen in on communications between RFID tags and readers
- The encryption protocol used for WPA2
- accesses unauthorized information from a Bluetooth connection
- An in-depth examination and analysis of a WLAN site
- securely tunnels any credential form for authentication using TLS
- A wireless attack in which false deauthentication
- can be used to detect a rogue AP
- standards used to transmit information from tags to a proximity reader
- not recommended as a security protection for SSID
- tool that provides a visual representation of the wireless signal
Down
- web page that is displayed to users when they attempt to access a public network
- sends unsolicited messages to Bluetooth-enabled devices
- commonly called Wi-Fi
- usage in contactless payments
- A wireless technology that uses short-range radio frequency
- An EAP method designed to simplify the deployment of 802.1x
- Intentionally flooding the radio frequency spectrum
- 200 milliwatts (mW)
- minimum amount of wireless signal should extend beyond the walls of the building
- An AP set up by an attacker to mimic an authorized AP
- can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
- A unique name identifying a Wi-Fi network
- IEEE 802.1x standard
- no longer support WEP
- An unauthorized AP that allows an attacker to bypass many of the network security
27 Clues: 200 milliwatts (mW) • IEEE 802.1x standard • commonly called Wi-Fi • no longer support WEP • usage in contactless payments • can be used to detect a rogue AP • The encryption protocol used for WPA2 • A unique name identifying a Wi-Fi network • uses digital certificates for authentication • A wireless attack in which false deauthentication • ...
Appsec and AI Security 2025-06-19
Across
- The paid add-on that includes vulnerabilities, policies, and red-teaming (15 letters)
- AI that is designed to interact with humans using natural language (17 letters)
- Pre-built libraries, tools, and services that provide the necessary infrastructure to develop, train, and deploy AI systems efficiently (11 letters)
- A document that lists all components in a software application (4 letters)
- Single word to encompass the fundamental building blocks that enable an AI system to perform its functions, such as AI models, frameworks, agents, or architectures like RAGs (13 letters)
- The unauthorized extraction of data from a system (15 letters)
- Analysis of application source code to identify security vulnerabilities before deployment (4 letters)
- Risks such as hallucinations, data leakage, prompt injections, and biases that are present only in the context of a given application and how it is configured, connected, and customized (19 letters)
- A standardized set of rules that helps an AI remember what's been said or what's happening right now (18 letters)
- Development environments where AI capabilities are deeply integrated throughout the software development lifecycle for tasks like code generation, debugging, and refactoring (12 letters)
- Analysis of third-party and open-source components in applications (3 letters)
Down
- Mathematical structures trained to perform specific tasks by learning patterns in data (9 letters)
- A type of AI framework that enhances LLMs by retrieving relevant external data to generate more accurate, factual, and contextual responses (28 letters)
- Name of the overall product, when referring to Mend AI capabilities in the platform and Mend AI Premium together (7 letters)
- Technique to manipulate AI systems by crafting inputs that bypass security controls (14 letters)
- Unauthorized use of AI tools and components by employees/teams without formal approval (10 letters)
- The name of our platform, fundamentally re-architected to operate in a world where AI is integral (18 letters)
- Autonomous AI entities that perceive their environment, make decisions, and take actions to achieve specific goals, often without human intervention (9 letters)
- When AI systems generate content that isn't grounded in factual information (13 letters)
- Applications or processes that integrate and utilize artificial intelligence components like AI models, AI agents, RAGs and MCPs (10 letters)
20 Clues: The unauthorized extraction of data from a system (15 letters) • A document that lists all components in a software application (4 letters) • Analysis of third-party and open-source components in applications (3 letters) • AI that is designed to interact with humans using natural language (17 letters) • ...
IT Systems and Security 2025-07-21
Across
- Ranking tasks or risks by importance
- Public perception that can be damaged by breaches
- A fine or consequence for non-compliance
- I am harmful
- System settings that affect performance
- Programs and applications
- loss Critical information is erased or inaccessible
- The users who interact with and operate in an environment
- How often a certain risk or issue occurs
- Ordering risks based on severity and likelihood
- Numerical estimate of potential loss
- Unintentional harmful events affecting systems
- You need to identify this before setting up an IS
- Likelihood of a specific event occurring
- Flaws that can be exploited by threats
Down
- Organized collections of structured information
- Physical parts of a computer or system
- I am important for your network
- Example: Routers, switches, cables in connectivity, etc.
- disasters Earthquakes or floods that disrupt systems
- Enhancements to improve system
- Evaluation of consequences of an incident
- What do you do after completing a task?
- Gaps in security or system design
- Series of steps to accomplish tasks in systems
- System A coordinated set of components to manage data
- What else do you need other than physical components?
- Period when a system is unavailable/offline
28 Clues: I am harmful • Programs and applications • Enhancements to improve system • I am important for your network • Gaps in security or system design • Ranking tasks or risks by importance • Numerical estimate of potential loss • Physical parts of a computer or system • Flaws that can be exploited by threats • System settings that affect performance • ...
Digital citizenship topics 2017-09-08
Across
- legal use of copyrighted material
- playing nice online
- rules you should be following when you are online
- use passwords that only you would understand
- keeping your accounts private
- the buying and selling of items online
Down
- the trail left in cyber space that never goes away
- doing the right thing online
- dont talk to people you have never met before
- being mean to people repetitively online
- using the internet for the right purposes
- using someone elses work and taking credit for it
- apps used to share information and talk with others
- you can put anything on the internet for people to use
14 Clues: playing nice online • doing the right thing online • keeping your accounts private • legal use of copyrighted material • the buying and selling of items online • being mean to people repetitively online • using the internet for the right purposes • use passwords that only you would understand • dont talk to people you have never met before • ...
Middle Childhood 2017-10-27
Across
- Realizing things can be arranged in a logical series.
- Child over 95th percentile for their age group.
- Type of bullying including hitting.
- Type of bullying that effects peer relationships.
- Family with relatives living with parents and children.
Down
- Organizing things into groups based off characteristics.
- Child over 85th percentile weight for their age group.
- Family with two married parents and children.
- Type of bullying done through words.
- These children typically bully through their words.
- Unusual difficulty with reading.
- These children bully more physically
- One husband and two or more wives in a family.
- Type of bullying done through technology.
14 Clues: Unusual difficulty with reading. • Type of bullying including hitting. • Type of bullying done through words. • These children bully more physically • Type of bullying done through technology. • Family with two married parents and children. • One husband and two or more wives in a family. • Child over 95th percentile for their age group. • ...
Bullying 2017-02-19
7 Clues: kicking and Pushing • bad use of technology • do bad face moviments • say bad words and offences • don`t talk or play with others • say or act in a bad way affecting others • ask classmates in bad modos for money or lunch
BANKING 2025-04-23
13 Clues: - cuota • - saldo • - emitir • - cajero • - cuenta • - extraer • - préstamo • - garantía • - sucursal • - depositar • - transferir • - descubierto • - extracto bancario
Splunk Education Crossword for Enterprise Security 2021-06-18
Across
- One type of thresholding in a correlation search
- Security _______, main high level dashboard showing current notable events
- The engine that is used to search for multiple notable events and creates a specific type of event when they are found
- One of the things that the CIM does
- Used to hide events from incident review
- A chronological collection of activities and notes to help determine the root cause of a threat or breach
- A Splunk app that can be used to capture traffic without the use of an agent
- One of many CIM compliant data models showing data such as success and failure
Down
- A person, host, filetype or url used in investigations
- A cumulative metric to help determine what assets and identities are worth investigating
- Used within risk to map to a known security framework
- You can add assets, identities and websites to this to highlight their use within your systems
- Search used to discover security anomalies within your data
- A type of event which can be triggered from a correlation search
- You should enable this on all data models being used by ES
- Calculated using severity and priority
- When deploying, you need one of these dedicated to ES
- Imperative to prevent false positives and negatives showing within your correlation searches
18 Clues: One of the things that the CIM does • Calculated using severity and priority • Used to hide events from incident review • One type of thresholding in a correlation search • Used within risk to map to a known security framework • When deploying, you need one of these dedicated to ES • A person, host, filetype or url used in investigations • ...
bullying-by Harvey.B 2023-11-28
Across
- when you be unkind to a person
- bulling when you bully someone online
- when you are really angry
- when you make someone attack you
Down
- this is called when a person watches someone get bullied
- stander when you tell on the person when they are bulling someone
- when you are getting hurt
- when you bully someone for there skin color
- when you are the one being bullied
9 Clues: when you are getting hurt • when you are really angry • when you be unkind to a person • when you make someone attack you • when you are the one being bullied • bulling when you bully someone online • when you bully someone for there skin color • this is called when a person watches someone get bullied • stander when you tell on the person when they are bulling someone
ethan is gay 2024-12-25
Across
- the toys emmi and ethan played with when she was very small
- ethans favorite animal
- a beautiful french lover
- our forbidden stinky secret (hint: in the Meijer parking lot)(2 words)
- the best gift ethan got for emmi
Down
- a creepy boy who had a crush on emmi so ethan cyber bullied him (2 words)
- ethans favorite barbie movie
- our fluffy emotionally charged disagreement
- wanna go shoot some ____?
- where emmi found love and lost it (digitally)
- acronym for ethans favorite childhood midnight snack
11 Clues: ethans favorite animal • a beautiful french lover • wanna go shoot some ____? • ethans favorite barbie movie • the best gift ethan got for emmi • our fluffy emotionally charged disagreement • where emmi found love and lost it (digitally) • acronym for ethans favorite childhood midnight snack • the toys emmi and ethan played with when she was very small • ...
GO EXPO Crossword 2025-10-11
Across
- Foundation for strong teamwork
- Where you can find AQS's biggest solar installation
- Common entry point for cyber attacks
- Klikk delivery promise
- Technology-enabled support service that uses devices and sensors to help people live safely and independently in their own homes
Down
- Brain of a solar energy system
- Driving a digital Malta, where no-one is left behind
- Cybersift flagship product
- Heating, ventilation, and air conditioning
- One of the three benefits of SENS
- The second of BMIT’s 3 Es
11 Clues: Klikk delivery promise • The second of BMIT’s 3 Es • Cybersift flagship product • Brain of a solar energy system • Foundation for strong teamwork • One of the three benefits of SENS • Common entry point for cyber attacks • Heating, ventilation, and air conditioning • Where you can find AQS's biggest solar installation • Driving a digital Malta, where no-one is left behind • ...
BULLYING 2024-07-25
4 Clues: If the cyber bullying persist you? • What if you are being cyber bullied?? • What to do if you see a person being bullied • What to do if someone else is getting bullied on the internet?
Types of Bullying 2013-08-12
Across
- Using information and communication technologies to bullying someone.
- Treating someone like an outcast.
- Secretly hurting a person such as spreading rumours.
- Affecting someone's relationship, excluding, making the person feel left out etc.
Down
- Name calling, saying hurtful things.
- Hurting someone.
- Hurting a person's feelings.
7 Clues: Hurting someone. • Hurting a person's feelings. • Treating someone like an outcast. • Name calling, saying hurtful things. • Secretly hurting a person such as spreading rumours. • Using information and communication technologies to bullying someone. • Affecting someone's relationship, excluding, making the person feel left out etc.
Computing Test 2019-06-17
7 Clues: hacking • bullying online • a law or a set of laws • intelligence that is not human • someone who has data stored about them • hackers putting bad things in files to hack you • the divide between people with internet and not
Internet Term Crossword Puzzle 2013-09-03
15 Clues: saving • typing • letters • hacking • security • advertise • criticism • main page • communicate • significance • linking files • file,edit,view • filing program • testing program • posting comments
TRANSFORM 2022-12-02
15 Clues: data • money • bette • Fraude • answer • suppor • quickest • eveeryone • less cost • data base • in business • of Mobility. • doing better • to Information. • opportunity cost
Vocabulary Recap ch 9 & theme vocabulary human welfare & religion 2025-09-10
15 Clues: parish • asukas • maallinen • vilkaista • avoliitto • constable • kyyristyä • nervously • hold back • tosin/vaikka • (arvo)merkki • child support • social security • jäädä eläkkeelle • kevyt/pinnallinen
fnaf security breach 2022-02-24
13 Clues: wolf • bear • chicken • aligator • lazer gun • sun and moon • the security guard • dancing rabit lady • no flash photography • found in each office • the spider in the vents • the Dj of the west arcade • the "red light green light bots"
Safety and Security 2023-10-25
Across
- What is it called when someone receives an email from a fraudster pretending to be from a reputable company in order to obtain personal information?
- How much is the total teller drawer limit at a branch without TCRs?
- What is the morning glory alarm code?
- What is the Metro Region's safe word for Banker's Security?
- When can you plug a flash drive into your computer?
Down
- What kind of control is needed to log and process night drop?
- Where is the robbery kit located at EVERY branch?
- How many associates need to be present at open and close?
- How much is the teller top drawer cash limit?
- What is it called when a robber follows you in to the branch at open?
- What phone number do you call after a robbery when it is safe to do so?
- What percentage of elder abuse is committed by a family member?
- What month is CCBs Safety and Security month?
13 Clues: What is the morning glory alarm code? • How much is the teller top drawer cash limit? • What month is CCBs Safety and Security month? • Where is the robbery kit located at EVERY branch? • When can you plug a flash drive into your computer? • How many associates need to be present at open and close? • What is the Metro Region's safe word for Banker's Security? • ...
Safety and Security 2023-03-09
Across
- If you see a _________ person and they seem unapproachable, do not make contact.
- When using the _________ button at the door, make sure the door is securely shut before walking on.
- If the person seems unpleasant or abusive, do not ______.
- It may be necessary to provide a ____________ of the suspicious person. Take note of things like, gender, hair color, race, clothing, unique characteristics.
- If safe to do so, __________ the suspicious person from a distance.
- All visitors must always be __________ through the laboratory.
Down
- Never let anyone ___________ after you, when entering the facility.
- If you are trying to report a suspicious person and a supervisor is unavailable, report it to the ____________ Administrative Office or the Bureau Chief.
- If you see someone without a badge and they seem unapproachable, report it to a _______.
- All ___________ must sign in and out at the building 4 entrance.
- If you are working during non-business hours, you must sign in AND______.
- If you see someone not wearing a _______ and they seem approachable, ask them if you can help them.
- Direct all deliveries to be taken to the ______.
13 Clues: Direct all deliveries to be taken to the ______. • If the person seems unpleasant or abusive, do not ______. • All visitors must always be __________ through the laboratory. • All ___________ must sign in and out at the building 4 entrance. • Never let anyone ___________ after you, when entering the facility. • ...
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Protagonist • Night Guard • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
FNaF Security Breach 2022-05-31
13 Clues: Furry • Aligator • Protagonist • Night Guard • A White Bird • Such a nice fello • MOLTEN FREDDY?!?! • The "Best" of the 4 • DARNIT HE CAME BACK! • Wind-up vent annoyance • Caused Freddy's Mental Crisis • The Tidy & Light-Sensitive One • The Orange Bear with a thunderbolt
Information Security Crossword 2024-10-28
Across
- An attack that exploits software flaws before developers can release a patch or fix.
- The process of confirming the identity of a user, typically before granting access to resources.
- An unauthorized action that exposes, steals, or compromises data from a system.
- The process of testing a system, network, or web application to find security vulnerabilities.
- A cryptographic process of converting data into unreadable code to protect it from unauthorized access.
- A security mechanism that prevents unauthorized access to a network by filtering traffic.
- A type of malicious software designed to gain unauthorized access to a computer system.
Down
- A program that secretly records everything typed on a computer, usually for malicious purposes.
- A cyberattack where the perpetrator floods a server with excessive traffic
- A malicious attack where data is encrypted by criminals to demand payment for its release.
- Which term is used to describe the “cargo” that malware brings with it when it infects a device?
- What is a term for a group of computers that is networked together and used by hackers to steal information?
- A malicious program disguised as legitimate software, often used to gain unauthorized access.
13 Clues: A cyberattack where the perpetrator floods a server with excessive traffic • An unauthorized action that exposes, steals, or compromises data from a system. • An attack that exploits software flaws before developers can release a patch or fix. • A type of malicious software designed to gain unauthorized access to a computer system. • ...
Security Fortnight Crossword 2025-07-18
Across
- Protective footwear used in hazardous work environments.
- Regular rounds to monitor and ensure safety.
- Vehicle used to transport patients in emergencies.
- Physical inspection by patting down a person.
- Tunnel-like device that inspects bags using X-rays.
Down
- Scans individuals for hidden metallic objects.
- Initial treatment provided before medical professionals arrive.
- Door Clearly marked route for emergency evacuation.
- Group trained to act quickly during emergencies.
- Provides support while ascending or descending stairs.
- Used to block or control access temporarily.
- Gaining unauthorized access by closely following someone.
- Activates during power failure to guide evacuation.
13 Clues: Used to block or control access temporarily. • Regular rounds to monitor and ensure safety. • Physical inspection by patting down a person. • Scans individuals for hidden metallic objects. • Group trained to act quickly during emergencies. • Vehicle used to transport patients in emergencies. • Door Clearly marked route for emergency evacuation. • ...
spainsh 10 2025-03-18
15 Clues: agent • money • ticket • wallet • arrival • customs • airport • luggage • ID badge • airplane • purse/bag • ATM machine • airplane ticket • disposabel camera • security checkpoint
The Good, The Bad, And The Ugly 2015-04-19
Across
- The not-so-good aspects from social media.
- This skill is tested when social media comes into play.
- Justice This is achieved through the various channels of social media.
- The positive aspects that arise from social media.
- Fake relationships.
- The rumors that are spread are sent though this.
- The worst effects from social media.
Down
- This is improved through a world wide data base for information.
- Crude pictures with harmful captions.
- The improved communication through technology.
- Bullying Bullying over social media.
- Hackers are now easily able to invade this.
12 Clues: Fake relationships. • Bullying Bullying over social media. • The worst effects from social media. • Crude pictures with harmful captions. • The not-so-good aspects from social media. • Hackers are now easily able to invade this. • The improved communication through technology. • The rumors that are spread are sent though this. • ...
The Fourth Stall 2023-10-10
Across
- The Place in which Mac's business takes place
- The Bully that starts all the rumors.
- The main Protagonist of the story
- The place that Staples takes Mac to get beaten up. Supposedly haunted
Down
- Middle school bully. He gets called "deranged"
- The cyber bully
- The main antagonist of the story
- Mac's bodyguard that keeps him out of trouble
- What Barnaby Willis is known as
- Staples' Right hand man, normally beats up Mac
- Mac's best friend
- Staples' inside man on Mac, turns goo in the end
12 Clues: The cyber bully • Mac's best friend • What Barnaby Willis is known as • The main antagonist of the story • The main Protagonist of the story • The Bully that starts all the rumors. • Mac's bodyguard that keeps him out of trouble • The Place in which Mac's business takes place • Middle school bully. He gets called "deranged" • Staples' Right hand man, normally beats up Mac • ...
Communication in the future 2024-11-24
Across
- room A place online where people talk.
- difference When people from different places do things differently.
- To talk or work with someone.
- phone A phone with a wire at home or work.
- channel A way to send or get messages.
- world The internet and things we do online.
- Pictures, sounds, and videos together.
Down
- Talking with someone in person.
- breakdown When people cannot understand each other.
- To talk or share ideas with someone.
- board A website where people leave messages.
- barrier When people cannot understand each other’s language.
- language Using hands and face to show ideas.
13 Clues: To talk or work with someone. • Talking with someone in person. • To talk or share ideas with someone. • Pictures, sounds, and videos together. • channel A way to send or get messages. • breakdown When people cannot understand each other. • phone A phone with a wire at home or work. • room A place online where people talk. • ...
9GEO FOOD- Noah Lawrence 2017-09-14
Across
- Long term weather effect
- An edible substance
- The practice of growing and farming crops
- A substance providing nourishment
- A liquid essential to life
Down
- Factors of an areas food security
- The condition defining the difference between plant and animals from inorganic materials
- A catastrophe causing large damage or loss of life
- In short supply of something
- being free from danger or threat
- Growing, advancing, etc
- A factor relating to wealth
12 Clues: An edible substance • Growing, advancing, etc • Long term weather effect • A liquid essential to life • A factor relating to wealth • In short supply of something • being free from danger or threat • Factors of an areas food security • A substance providing nourishment • The practice of growing and farming crops • A catastrophe causing large damage or loss of life • ...
You Don't Know What You Don't Know 2021-01-12
Across
- Needs to be posted by 5pm Wednesday, February 3rd
- Provides PD opportunities for staff for all of MCPS
- Link to email grade sheets to parents through Synergy
- Publishes a Professional Newsletter regularly
- Long Term Sub in AOHP
Down
- Who will receive PDF of "Mark Verification by Teacher" report
- Birthday on January 22
- A 2nd Semester 1.0 Position recently posted
- The # of rounds to find a Cyber Teacher
- Color of the Edit Final Grade option in Synergy
- Where you register for staff development trainings
11 Clues: Long Term Sub in AOHP • Birthday on January 22 • The # of rounds to find a Cyber Teacher • A 2nd Semester 1.0 Position recently posted • Publishes a Professional Newsletter regularly • Color of the Edit Final Grade option in Synergy • Needs to be posted by 5pm Wednesday, February 3rd • Where you register for staff development trainings • ...
Cyber-Bullying is a crime 2014-11-05
Across
- Includes pushing, slapping or hitting someone
- A person harmed or injured
- Involves the use of communication technologies
- Exploitation (two words) includes sharing videos or photos with nudity of persons 18years and under
- Ready or likely to attack or confront
- Observer or spectator
Down
- Communication of a false statement that harms
- A person who has committed a crime
- The action of harming someone because they have harmed you
- Intentional behavior which is found threatening or disturbing
- Carried out because of despair
11 Clues: Observer or spectator • A person harmed or injured • Carried out because of despair • A person who has committed a crime • Ready or likely to attack or confront • Communication of a false statement that harms • Includes pushing, slapping or hitting someone • Involves the use of communication technologies • The action of harming someone because they have harmed you • ...
Airport 2022-05-18
Unit 5 - Architechture 2014-04-21
28 Clues: Lift • Lohn • Wärme • Angst • Stahl • Eisen • Decke • Termin • anstatt • Bauland • Werkzeug • Stockwerk • Kilometer • pünktlich • Baustelle • Sicherheit • Verbindung • Ziegelstein • Klimaanlage • Kühlschrank • Beleuchtung • Architekt/in • ungewöhnlich • Wolkenkratzer • Geschäftsmann • Herausforderung • Stadtsilhouette • entwerfen,entworf
8A Vocab pg 422 2014-05-18
26 Clues: open • pilot • delay • aisle • ready • closed • direct • flight • to last • luggage • customs • to plan • tourist • foreign • airport • arrival • passport • suitcase • employee • to check • to board • passenger • departure • to insist • announcement • security checkpoint
Government Acronyms 2023-01-21
21 Clues: mail • banks • taxes • pills • parcel • attorneys • farm loans • snow plows • Aeronautics • plant police • intelligence • investigation • water and air • covid monsters • disaster relief • labor relations • retaliation force • security alliance • financing paintings • global peace-makers • inner-city home development
Airport Spanish Vocab - Reya C 2022-10-13
20 Clues: line • gate • ticket • passport • swimsuit • airplane • suitcase • security • to board • passenger • departure • intinerary • train station • monitor;screen • to take a trip • to get in line • tourist office • to call someone • flight attendant • can you please tell me where
French Vocab Crossword 2020-01-12
22 Clues: agent • plane • verify • ticket • flight • customs • airport • to land • suitcase • passport • transfer • take off • to serve • passenger • boarding gate • boarding pass • identification • check in kiosk • security check • ticket counter • male flight attendant • female flight attendant
Woordjes 2023-12-06
30 Clues: rel • straf • gebouw • aanval • bewijs • moorde • inbraak • dronken • getuige • rechter • verdacht • beroving • verdacht • dreiging • bewapend • rechtzaak • roekeloos • uitspraak • rechtzaak • aggressief • slachtoffer • gewelddadig • toeschouwer • overtreding • per ongeluk • beveiliging • onruststoker • gerechtigheid • hulpverleners • brandstichting
vocabularry 2023-09-20
28 Clues: Seni • Alam • Film • Jelek • Dunia • Kecil • Bodoh • Besar • Benda • Lembut • Cantik • Cerita • Tinggi • Pemain • Pendek • Pintar • Masalah • Ekonomi • Keamanan • Keluarga • Industri • Kemampuan • Kekuasaan • Kesehatan • Masyarakat • Pengertian • Pengetahuan • Orang-orang
SP8 Unit 7 2024-05-10
27 Clues: lupa • ilman • uskoa • pettää • luvata • ongelma • muistaa • ihastus • salasana • keskusta • selittää • skandaali • kommentti • käyttäytyä • keskustelu • häpeissään • rasistinen • kateellinen • keskustella • turvallisuus • antaa anteeksi • persoonallisuus • roska, pötypuhe • epäystävällinen • pyytää anteeksi • kiusallinen, nolo • ongelmat, hankaluudet
Economics Vocabulary 2024-03-04
20 Clues: after • hourly • annual • before • taken out • collectors • tax season • contribution • income based • self employed • illegal fraud • money received • money generated • national programs • verifies employment • reports withholdings • allowances/dependents • medicare/social security • permanent workers/residents • money earned minus deductions
Advisor 2023-10-17
p.28-29 2025-04-15
22 Clues: знак • выход • взлет • мягкий • чемодан • очередь • выяснить • удобство • огромный • следовать • запыхавшись • безопасность • приземляться • относительно • средневековый • вагон-ресторан • взять, поднять • садиться на борт • место (в самолете) • ___car, bus, plane • отправиться в путешествие • ____of schedule раньше графика
Bahasa Indonesia BIPA B2 2025-11-20
29 Clues: far • sea • eyes • head • west • nose • turn • east • train • north • close • plane • south • bored • across • waiter • teacher • usually • airport • holiday • headache • shopping • security • straight • interested • grandfather • grandmother • circle/round • unfortunately
Cyber safety-AGNES MATRIN 2016-05-26
Across
- information about a particular subject that is available on the internet
- an ad that comes up on a device randomly
- a piece of information
- the fact of being who or what a person is
- helps you when inappropriate things come up on a device at home
- data from one computer system
- security system
- secures a system from virus
Down
- a global computer network providing a variety of information
- the condition of being protected
- to enter your username or password
- a short article giving a description about a person
- that allows you to access into a system
- in a place or situation that allows you to do things without other people seeing you
- sending or posting mean messages
- a device that is connected to the internet
- damaging systems
17 Clues: security system • damaging systems • a piece of information • secures a system from virus • data from one computer system • the condition of being protected • sending or posting mean messages • to enter your username or password • that allows you to access into a system • an ad that comes up on a device randomly • the fact of being who or what a person is • ...
Conspiring Cities of India 2018-03-08
Across
- From winds to cannons, forts to sands.
- Famous for its Cyber Hub, but also has a great Ambience.
- Diamond capital of India.
- Largest city of the smallest state.
Down
- Also known as "Saketa", one of the Saptapuri for Hindus.
- beaches and skyscrapers, virtual and real.
- 30 JEE aspirants gather here.
- Coromandel Coast of Bay of Bengal.
8 Clues: Diamond capital of India. • 30 JEE aspirants gather here. • Coromandel Coast of Bay of Bengal. • Largest city of the smallest state. • From winds to cannons, forts to sands. • beaches and skyscrapers, virtual and real. • Also known as "Saketa", one of the Saptapuri for Hindus. • Famous for its Cyber Hub, but also has a great Ambience.
ΣΧΟΛΙΚΟΣ ΕΚΦΟΒΙΣΜΟΣ (ΤΑΣΟΣ ΚΟΥΚΛΙΔΗΣ Α2) 2022-01-31
Across
- ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ
- ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ
- H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING
- ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
- ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING?
Down
- ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ
- ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ
- ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ
8 Clues: ΤΟ BULLYING ΣΤΑ ΕΛΛΗΝΙΚΑ • ΕΞΩ Η ... ΑΠΟ ΤΑ ΣΧΟΛΕΙΑ • ΠΟΥ ΓΙΝΕΤΑΙ ΤΟ CYBER BULLΥING? • ΕΙΝΑΙ ΟΛΑ ΤΑ ΠΑΙΔΙΑ ΣΤΟ ΣΧΟΛΕΙΟ • H ΟΡΟΛΟΓΙΑ ΑΥΤΟΥ ΠΟΥ ΔΕΧΕΤΑΙ BULLYING • ΤΟ ΑΤΟΜΟ ΤΟ ΟΠΟΙΟ ΑΣΚΕΙ BULLYING ΣΕ ΚΑΠΟΙΟΝ • ΕΝΑ ΠΙΘΑΝΟ ΜΕΡΟΣ ΠΟΥ ΜΠΟΡΕΙ ΝΑ ΓΙΝΕΙ Ο ΕΚΦΟΒΙΣΜΟΣ • ΒΟΗΘΑΝΕ ΠΟΛΛΕΣ ΦΟΡΕΣ ΤΟΥΣ ΜΑΘΗΤΕΣ ΓΙΑ ΝΑ ΑΝΤΙΜΕΤΟΠΙΣΟΥΝ ΤΟΝ ΕΚΦΟΒΙΣΜΟ
Bullying Recap 2023-11-08
Across
- ......... up to bulling!
- When a person seeks to harm, intimidate, or coerce someone
- A cause, explanation, or justification for an action or event
- Have been bullied in the last 12 months
Down
- Another type of bullying
- When someone says something hurtful once!
- A type of bullying
- How might being bullied make someone react?
8 Clues: A type of bullying • Another type of bullying • ......... up to bulling! • Have been bullied in the last 12 months • When someone says something hurtful once! • How might being bullied make someone react? • When a person seeks to harm, intimidate, or coerce someone • A cause, explanation, or justification for an action or event
Kianasearch 6-18-24 2024-06-18
8 Clues: “can somebody match my” • the best way to cook an egg • my underdog team for the euros • the type of attack on Ascension • my profile name on my peacock account • the best person on Love Island Season 11 • the name of the Crystal that powers lightsabers • NYC borough where the UGA photographer is moving to
Operate a personal computer 2025-05-24
8 Clues: Command to copy • I am use to type • You use me to scan things • Another name for the monitor • Used to prevent a cyber attack • Small portable device use to store files • The physical components of a computer system • The Ctrl and Alt keys are always used in combination with other keys.
How well do you know MUN. 2017-11-26
Across
- Refers to the UN Security Council's five permanent members.
- What is the oldest Polish MUN?
- Council A body of 5 great powers, which can veto resolutions and 10 rotating member states, which makes decisions about international peace and security including the dispatch of UN peacekeeping forces.
- A change to a draft resolution that is on the floor.
- A document that has been passed by an organ of the UN that aims to address a particular problem or issue.
Down
- of Order These are used if you believe there was a mistake made in the rules of procedure.
- League of Nations At the very beginning, it was called ...
- Caucus A form of informal debate or consultations where delegates are not obliged to remain seated, but can walk around the room and negotiate matters with their fellow delegates.
- General The head of the MUN.
- Nations An organization of independent states formed in 1945 to promote international peace and security.
10 Clues: General The head of the MUN. • What is the oldest Polish MUN? • A change to a draft resolution that is on the floor. • Refers to the UN Security Council's five permanent members. • League of Nations At the very beginning, it was called ... • of Order These are used if you believe there was a mistake made in the rules of procedure. • ...
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
Unit 8 2024-05-08
15 Clues: Banks • Rural • Insect • exports • Civilian • Programs • Airplane • Transport • Major crop • Agricultural • increase demand • Social Security • Japanese attack • Youngest govenor • Georgia representative
CYBERCRIME 2021-07-11
Across
- A politically- or ideologically-motivated cyber attack or hack.
- A way to access electonic system by bypassing some or all security mechanisms.
- A satellite navigation system that indentifies the precise lovation of the transmitting device.
- The practice of gathering, retaining, and analyzing computer-related data for investigative purposes.
- Malicious software, such as a virus or worm, that attacks a target computer.
- The overaching program that runs all the functions on a computer or other electronic device.
- A company that offers access the internet.
- A camera connectee to computer l, generally used to then stream videos to the internet.
- Resource to be accessed, often expressed as a time period.
- Very similar to viruses in that they are computer programs that replicatefunctional copies of themselves.
- The process ofnusing a
- Determining the identity or location of an attacker or an attacker's intermediary.
- The interdependent network of information technology, infrastructures that includes internet.
- Hardware or software designed to prevent unathorized users from accessing a computer system.
- A user name and password used to identify qn individual attempting to gain access to a restricted page or network.
- A network point that acts an entrance to another network
- A unique internet identifier registered
- An online journal.
- A program used to access the internet.
- Assurance that remains private and no one sees it except for those expected to see it.
- A program that masks something harmful, such as a worm or virus, that it carries into a device.
Down
- Attempting to mimic an official email from a trusted organization to lire individuals.
- Refer to someone who gains access to a system, software, or hardware without permission.
- A log that chronicles any changes made to a document, presentation, software applications, etc.
- A word, phrase, or collection of characters that must be entered correctly on a login page to access content in a restricted area.
- Are a botnet of comprised hosts, controlled by a single intentity.
- A unique internet identifier registered to an entity.
- An information packet sent from website to a web browser that records a user's activity on the website.
- algorithm against data to produce a numeric value that is representative that data.
- Stands for "Wireless Fidelity".
- A software robot that performs automated tasks.
- The act of one individual harrasing or intimidating another individual via the interner.
- Unsolicited advertising or other information sent out via email or other messaging service.
- A massed data that is used to describe large amounts of other internet data.
- A grou of computers that is linked to share data and othe information.
- A website that finds information across the Internet based on a set of search criteria.
- an entity.
- A network security measure in which information is encoded or scrambled prior to transmission.
- Hardwire, softwire, databases, and relevant documentation for information system at given point in time.
- The changes in data caused by an intruder or investigator accessing files and running applications or process.
- Aim to overwhelm the resources of a targeted system to crash that system.
41 Clues: an entity. • An online journal. • The process ofnusing a • Stands for "Wireless Fidelity". • A program used to access the internet. • A unique internet identifier registered • A company that offers access the internet. • A software robot that performs automated tasks. • A unique internet identifier registered to an entity. • ...
Return of ISIS Fighters who are Canadian Back to Canada Worksheet 2019-10-18
Across
- ISIS aims to create an _____ _____across Iraq, Syria and beyond.
- ISIS is trying to implement what type of law?
- ISIS fighters want to return back as the conditions in the prison camps are_____ for their families.
- Many security experts reported that this is a major ______ threat for Canada
- What does the acronym ISIS stand for?
- ISIS is a splinter sell of _______.
- Currently Canada is providing ______ ______ centers to rehabilitate ISIS fighters.
- ISIS is classified as what type of group?
Down
- ISIL stands for?
- Foreign women that marry ISIS fighters
- Women that marry ISIS fighters often meet them ________.
- Currently in Canada you can be persecuted for _______ if you try to leave to join ISIS, and get caught before you are able to.
- Canadian government is struggling to prosecute ISIS fighters due to lack of what?
- Currently the High Risk Returnee Interdepartmental Taskforce with help of the ______ is providing security and monitoring for returned ISIS fighters, as they go through rehabilitation programs.
14 Clues: ISIL stands for? • ISIS is a splinter sell of _______. • What does the acronym ISIS stand for? • Foreign women that marry ISIS fighters • ISIS is classified as what type of group? • ISIS is trying to implement what type of law? • Women that marry ISIS fighters often meet them ________. • ISIS aims to create an _____ _____across Iraq, Syria and beyond. • ...
cybersicuritie eng briac 2024-03-13
Across
- A barrier against network threats
- Harmful software
- is a network of private computers that have been infected with malicious software and are controlled as a group without the owners' knowledge.
- Fixing software vulnerabilities
- Protection against online threats
- Leaking sensitive information have 1 space (_)
- Unauthorized access
Down
- Double security confirmation for login have 1 space (_)
- Online assault
- Weakness in security
- Tricking people to reveal private information
- Scrambling data to keep it secret
12 Clues: Online assault • Harmful software • Unauthorized access • Weakness in security • Fixing software vulnerabilities • A barrier against network threats • Scrambling data to keep it secret • Protection against online threats • Tricking people to reveal private information • Leaking sensitive information have 1 space (_) • Double security confirmation for login have 1 space (_) • ...
Digital Responsibility 2018-09-07
Across
- what do you keep safe
- what do you do when you see someone get cyber bullied
- never believe what online
- Important to you
- When you are getting weird messages who do you tell
- if you see someone you know online getting harrassed what do you do
- who do you not meet up with online
- who do you be nice to online
Down
- what do you not post
- who do you not talk too
- what never leaves the internet
- what do you do before you post
12 Clues: Important to you • what do you not post • what do you keep safe • who do you not talk too • never believe what online • who do you be nice to online • what never leaves the internet • what do you do before you post • who do you not meet up with online • When you are getting weird messages who do you tell • what do you do when you see someone get cyber bullied • ...
The Good, The Bad, And The Ugly 2015-04-19
Across
- Bullying Bullying over social media.
- Fake relationships.
- The improved communication through technology.
- Crude pictures with harmful captions.
- The rumors that are spread are sent though this.
- The not-so-good aspects from social media.
Down
- The worst effects from social media.
- This skill is tested when social media comes into play.
- This is improved through a world wide data base for information.
- Justice This is achieved through the various channels of social media.
- The positive aspects that arise from social media.
- Hackers are now easily able to invade this.
12 Clues: Fake relationships. • The worst effects from social media. • Bullying Bullying over social media. • Crude pictures with harmful captions. • The not-so-good aspects from social media. • Hackers are now easily able to invade this. • The improved communication through technology. • The rumors that are spread are sent though this. • ...
malware 2023-06-19
Across
- your definition of unauthorized access data
- using the internet to talk to someone
- alows users to convert information
- online fraud that involves use of a malicious code
- sending emails or messages as fake companys
- trial of data when using the internet
Down
- network allows users to talk and make releationships
- when a person takes images or information
- malicious program sending through a network
- fraud crimes commited by cyberattackers
- constantlely getting messages or emails
- its a word phrase or numbers that allow you to enter things such as your phone tablet or computer
12 Clues: alows users to convert information • using the internet to talk to someone • trial of data when using the internet • fraud crimes commited by cyberattackers • constantlely getting messages or emails • when a person takes images or information • your definition of unauthorized access data • malicious program sending through a network • ...
Network Based Attacks 2025-01-31
Across
- intercepting two way communications between 2 parties
- exploiting weaknesses in ARP
- translates domain names into ip addresses
- capturing information from communications you shouldn't
- tools used to scan for vulnerabilities and open ports
Down
- cyber attack that first scans for vulnerabilities in a system
- exploits a vulnerability before vendor is aware of it
- identifies hosts in a network
- attack by stealing a session key or cookie
- posing as something you're not
- group of infected computers that work together without the owners knowledge
- denial of service attack
12 Clues: denial of service attack • exploiting weaknesses in ARP • identifies hosts in a network • posing as something you're not • translates domain names into ip addresses • attack by stealing a session key or cookie • intercepting two way communications between 2 parties • exploits a vulnerability before vendor is aware of it • ...
Respectful Relationships 2025-08-03
Across
- available on or performed using the internet
- that which is morally correct or just
- main means of mass communication
- way in which one acts or conducts oneself
- system of rules regulating the actions of its members
- sharing a nude or a naked selfie
- seek to harm, intimidate, or coerce
Down
- connection between 2 people
- process of receiving or giving systematic instruction, like school
- a feeling of deep admiration for someone
- forbidden by law, especially criminal law
- relating to the culture of computers, IT, and virtual reality
12 Clues: connection between 2 people • main means of mass communication • sharing a nude or a naked selfie • seek to harm, intimidate, or coerce • that which is morally correct or just • a feeling of deep admiration for someone • way in which one acts or conducts oneself • forbidden by law, especially criminal law • available on or performed using the internet • ...
BULLYINH 2023-09-22
6 Clues: : ----- BULLYING; online bullying • : someone who watches bullying happen • : A online service to help with bullying • : -------- BULLYING; harming someone's body • : ------ BULLYING; bullying someone with words • : --------- BULLYING: controlling someone's use of money
Solve Me M. 2023-08-11
6 Clues: A's Easter Egg • M's Easter Egg • What did I put inside? • What is missing from cyber? • Colour of A's drink from clue 5? • What is the mistake in the treasure hunt?
Word formation 2024-02-24
6 Clues: used to eat • related to cyber attacks • used when you are laughing • which is conducted in colleges • with out this your phone wont open • Our childhood incomplete with this
Kaylynn Boggs - Bullying 2022-05-17
Across
- name calling, insults, teasing, intimidation, homophobic or racist remarks
- happens more than once over a period of time
- what is the C in the ABCD's of bullying
- watching it happen
- hitting,kicking,tripping,pinching and pushing or damaging property.
- berate
- somebody is being hurt on purpose
- everybody is having fun,nobody gets hurt.
Down
- the attacker
- what is the D in the ABCD's of bullying
- being attacked
- Whats the A in the abcd's of bullying
- abusive or hurtful texts
- nobody is having fun,equal balance of power
- lying and spreading rumors playing nasty jokes to embarrass and humiliate
- Standing up for somebody
- of power whats the B in the abcd's of bullying
17 Clues: berate • the attacker • being attacked • watching it happen • abusive or hurtful texts • Standing up for somebody • somebody is being hurt on purpose • Whats the A in the abcd's of bullying • what is the D in the ABCD's of bullying • what is the C in the ABCD's of bullying • everybody is having fun,nobody gets hurt. • nobody is having fun,equal balance of power • ...
Financial Vocabulary 2013-10-13
24 Clues: obrót • spółka • aktywa • wycena • waluta • czynsz • oddział • podatek • prowizja • bankomat • zatrzymać • inwentarz • amortyzacja • tygodniówka • zobowiązanie • wypłacalność • ustalanie ceny • kapitał własny • kredyt hipoteczny • dźwignia finansowa • płynność finansowa • koszty nieprodukcyjne • zasiłek social ........ • wyciągać (pieniądze z konta)
Woordenschat Periode 6 Deel 3 2020-12-07
24 Clues: wet • arm • privé • tiener • mening • oorlog • beleid • moslims • armoede • koningin • politiek • getrouwd • wettelijk • veiligheid • maatregelen • bibliotheek • maatschappij • macht, kracht • interpretatie • maatschappelijk • scène, wereldje • systeem, stelsel • plaatselijk, lokaal • methode, manieren om iets te doen
words 2021-03-16
26 Clues: 3d • au • padi • nõrk • hull • eelis • idioom • kandik • hapnik • lähedal • haarama • asundus • karistus • kihlatud • somebody • suudlema • memoriaal • something • ülemkohus • katuseala • turvalisus • kohustuslik • tähistamine • uusarendusala • suhtlemisoskused • kohtamine(musimusi kalli kalli)
Smart moves 2 kpl 17 2017-05-10
Across
- osoittaa
- luokkakaveri
- lentää
- tuskin
- saapua (jonnekin)
- (tässä:) toimia
- lentokenttä
- varusteet, tavarat
- poikki, ’rättiväsynyt’
- kiivetä
- maisemat
- kotikaupunki
Down
- näky, näkeminen
- nuorisohotelli
- silti, kuitenkin
- kolkko
- ylellisyys
- lopen uupunut
- läpi
- innostunut, jännittynyt
- matkustaa
- turvatarkastus
- mennä joltakin ohi
- laskeutua
24 Clues: läpi • kolkko • lentää • tuskin • kiivetä • osoittaa • maisemat • matkustaa • laskeutua • ylellisyys • lentokenttä • luokkakaveri • kotikaupunki • lopen uupunut • nuorisohotelli • turvatarkastus • näky, näkeminen • (tässä:) toimia • silti, kuitenkin • saapua (jonnekin) • varusteet, tavarat • mennä joltakin ohi • poikki, ’rättiväsynyt’ • innostunut, jännittynyt
english-dutch 141 2018-07-26
26 Clues: no • job • not • soup • sick • sure • about • those • always • theory • trained • airport • infected • succcess • stricter • complete • saturday • locations • dangerous • something • work area • government • selection days • security guards • to asks, questions • almost, rather well
9/11 2024-09-11
26 Clues: Vol • Peur • Choc • Avion • Crash • Attaque • Enquête • Victimes • Héroïsme • Invasion • Sécurité • Mémorial • Pompiers • Pentagone • Survivant • Sauvetage • Évacuation • Terrorisme • Patriotisme • Traumatisme • Surveillance • Détournement • Effondrement • Tours Jumelles • Centre du Commerce Mondial • épicentre(site de l'attentat)
Alfa Company 1st 2025-10-28
24 Clues: E-1 • E-4 • SIR • SIR • OPEN • CODE • SNAP • CODE • STAFF • 5 1911 • VALUES • CLOSED • GENERAL • SELFLESS • PHONETIC • REPORTING • SAFETY S2 • LET US TRY • TO ENCOURAGE • STAR-SPANGLED • OF ALLEGIENCE • DEFINITION OF • UNITED STATES • EDWIN ALEXANDER
IT Professions 2024-04-17
Across
- Designs, develops, and maintains software applications or systems.
- Analyzes an organization's IT systems and processes to improve efficiency and functionality through technology solutions.
- Protects computer systems and networks from security breaches, investigates security incidents, and implements security measures to safeguard data.
- Analyzes and interprets complex data sets to extract insights and inform business decisions, using statistical analysis, machine learning, and data visualization techniques.
Down
- Designs and manages cloud computing infrastructure and solutions, including deployment, integration, and optimization of cloud services.
- Manages and maintains an organization's computer networks, including hardware, software, and security protocols.
- Administers, maintains, and secures databases, ensuring data integrity and accessibility.
- Oversees and manages IT projects from initiation to completion, ensuring they are delivered on time, within budget, and meet quality standards.
- Provides technical assistance, troubleshoots hardware and software issues, and assists users with IT-related problems.
- Designs, builds, and maintains websites and web applications using programming languages, frameworks, and technologies.
10 Clues: Designs, develops, and maintains software applications or systems. • Administers, maintains, and secures databases, ensuring data integrity and accessibility. • Manages and maintains an organization's computer networks, including hardware, software, and security protocols. • ...
codi bullying crossword 2023-03-21
Across
- bullying getting physically picked on everyday
- bullying some teases you verbally everyday
- someone who stands around and watches someone getting bullied
- a sore from being punched or kicked
Down
- someone teases you and picks on you everyday
- a type of physical bullying
- a type of psychological bullying
- bullying getting picked on online everyday
8 Clues: a type of physical bullying • a type of psychological bullying • a sore from being punched or kicked • someone teases you and picks on you everyday • bullying some teases you verbally everyday • bullying getting picked on online everyday • bullying getting physically picked on everyday • someone who stands around and watches someone getting bullied
